An effective SVD-based image tampering detection and self-recovery using active watermarking

In this paper, an effective tamper detection and self-recovery algorithm based on singular value decomposition (SVD) is proposed. This method generates two distinct tamper detection keys based on the singular value decomposition of the image blocks. Each generated tamper detection and self-recovery key is distinct for each image block and is encrypted using a secret key. A random block-mapping sequence and three unique optimizations are employed to improve the efficiency of the proposed tamper detection and the robustness against various security attacks, such as collage attack and constant-average attack. To improve the proposed tamper localization, a mixed block-partitioning technique for 4×4 and 2×2 blocks is utilized. The performance of the proposed scheme and its robustness against various tampering attacks is analyzed. The experimental results demonstrate that the proposed tamper detection is superior in terms of tamper detection efficiency with a tamper detection rate higher than 99%, security robustness and self-recovery image quality for tamper ratio up to 55%. HighlightsA novel SVD-based image tamper detection and self-recovery by active watermarking is proposed.A new aspect of singular values for each image's block is utilized to improve the detection rate.The combination of 4×4 and 2×2 block sizes improved the recovered image's quality.The proposed optimizations improved the scheme's security against several malicious attacks.The results showed the superiority of the algorithm in terms of accuracy, security and recovery.

[1]  Xu Shu,et al.  Research on image self-recovery algorithm based on DCT , 2010, J. Multim..

[2]  Wen Gao,et al.  An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..

[3]  Héctor M. Pérez Meana,et al.  Watermarking-based image authentication with recovery capability using halftoning technique , 2013, Signal Process. Image Commun..

[4]  Banani Patra,et al.  CRT-based fragile self-recovery watermarking scheme for image authentication and recovery , 2012, 2012 International Symposium on Intelligent Signal Processing and Communications Systems.

[5]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[7]  Chin-Chen Chang,et al.  Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..

[8]  Anthony Tung Shuen Ho,et al.  Image Authentication Using Active Watermarking and Passive Forensics Techniques , 2011, Multimedia Analysis, Processing and Communications.

[9]  Lung-Jen Wang,et al.  A Wavelet-based Multipurpose Watermarking for Image Authentication and Recovery , 2013 .

[10]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[11]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[12]  Azizah Abdul Manaf,et al.  Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking , 2012 .

[13]  Jeng-Shyang Pan,et al.  Self Embedding Watermarking Scheme Using Halftone Image , 2008, IEICE Trans. Inf. Syst..

[14]  Asifullah Khan,et al.  Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..

[15]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[16]  Yue Chen,et al.  A novel chaos-based fragile watermarking for image tampering detection and self-recovery , 2013, Signal Process. Image Commun..

[17]  Ching-Fen Jiang,et al.  A COLOR IMAGE AUTHENTICATION AND RECOVERY METHOD USING BLOCK TRUNCATION CODE EMBEDDING , 2012 .

[18]  Phen-Lan Lin Digital watermarking models for resolving rightful ownership and authenticating legitimate customer , 2001, J. Syst. Softw..

[19]  Jun-Dong Chang,et al.  LBP-based fragile watermarking scheme for image tamper detection and recovery , 2013, 2013 International Symposium on Next-Generation Electronics.

[20]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[21]  Jianming Liu,et al.  A novel fragile watermarking scheme for image tamper detection and recovery , 2010 .

[22]  Anthony Tung Shuen Ho,et al.  A semi-fragile pinned sine transform watermarking system for content authentication of satellite images , 2005, Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..

[23]  Chin-Chen Chang,et al.  A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..

[24]  Zhenxing Qian,et al.  A Flexible Scheme of Self Recovery for Digital Image Protection , 2012 .

[25]  Chun-Wei Yang,et al.  Recover the tampered image based on VQ indexing , 2010, Signal Process..